Technology Is Disrupting Intelligence & Espionage

Technology has long been seen as a source of disruption to our lives, communities and civilisations, provoking disruptive change at all scales, from individuals' routine daily activities to dramatic competition between global superpowers. This disruption can have both positive and negative effects, although they are often unevenly distributed across different groups. 

New technologies like Artificial IntelligenceQuantum computing and social media have transformed the intelligence community and given the United States’ adversaries new tools to observe and influence global politics. 

The recent Chinese surveillance balloon that was seen floating over the United States has generated a  vigorous debate which opened a window to the secret world of intelligence gathering as many countries use new technologies to get a political advantage. These disruptive technologies are now making spying far more difficult for Western nations.

In particular, the war in Ukraine is showing the espionage and intelligence worlds the risks and opportunities of open-source intelligence and that the US intelligence operation needs to wise-up to this or risk losing their way.

Professor Amy Zegart of Stanford University is the author of the book Spies, Lies and Algorithms in which she argues that the US government should change the way the intelligence community is organized. She proposes that a new US intelligence agency dedicated to open-source intelligence is needed to keep pace with the technology-driven intelligence revolution.  

In confirmation of this view, Jeremy Fleming, director of the British GCHQ spy agency, has said the West faces a battle for control of technologies such as artificial intelligence, synthetic biology and genetics.  Fleming has said quantum computing, which uses the phenomena of quantum mechanics to deliver a leap forward in computation, was getting closer and posed huge opportunities but also great risks.

The power balance in the spy world is changing and closed societies now have the edge over open ones. It has become harder for Western countries to spy on places such as China, Iran, and Russia and easier for those countries’ intelligence 

Foreign Affairs:    European Parliament:   Australian Financial Review:    Reuters:   Council on Global Affairs

You Might Also Read: 

From Ciphers To Cyber Security:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« How You Can Experience Safe Streaming With A Free VPN
Cyber Criminals' Earnings Fall As More Ransom Victims Refuse Payment  »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Aviva

Aviva

Aviva provides Cyber Liability cover for small to mid-market customers to help combat the threat of data and privacy breach.

ISEC7 Group

ISEC7 Group

ISEC7 Group is a global provider of mobile business services and software solutions. The company was one of the first movers in mobilising company and business processes.

Jenson Knight

Jenson Knight

Jenson Knight is a global cyber security, cloud and IT infrastructure staffing specialist.

InFyra

InFyra

InFyra is an IoT & Telecoms specialist consultancy, with extensive global and local experience in business and technology strategy, networks and solutions development.

Onward Security

Onward Security

Onward Security provides security solutions including network & application assessment, product security testing and security consulting services.

Ampliphae

Ampliphae

Ampliphae gives you an easy-to-deploy, sophisticated and affordable cloud-discovery, security and compliance platform.

CyVolve

CyVolve

Cyvolve is the next great leap forward in data security, ensuring constant encryption and pervasive control over all your data.

Snowflake

Snowflake

Empower your cybersecurity and compliance teams with Snowflake. Gain full visibility into security logs, at massive scale, while reducing costs of Security Information and Event Management systems.

Porto Research, Technology & Innovation Center (PORTIC)

Porto Research, Technology & Innovation Center (PORTIC)

PORTIC brings together several research centers and groups from P.PORTO in a single space, forming a superstructure dedicated to research, technology transfer, innovation and entrepreneurship.

Albania Lab

Albania Lab

Albania Lab is a consulting company focused on the development and delivery of digital solutions and IT services including cybersecurity.

nsKnox

nsKnox

nsKnox is a fintech-security company, enabling corporations and banks to prevent fraud and ensure compliance in B2B Payments.

Iconium Software

Iconium Software

DataLenz by Iconium offers continuous and real-time tracking of your data assets delivering you the tools you need to successfully reach and maintain your target security standards.

Redington

Redington

Redington offer products and services in solution areas including digital transformation, hybrid infrastructure and cybersecurity.

ECIT

ECIT

ECIT is your preferred provider of finance and IT services. We believe in the value of combining financial and IT services to streamline and improve the operation of your business.

Tracebit

Tracebit

Tracebit uses decoys to detect and respond to cloud intrusions in minutes.

C/side (cside)

C/side (cside)

At c/side, we're creating the ultimate delivery, performance and detection mechanism for browser-side fetched 3rd party Javascript.